Risks in Cyber Crime, Cyber Terrorism and Warfare, Cyber Threats …What You Need to Know

Course Description: 

The objective of this seminar is to provide practical and immediately usable information to professionals on how to protect both data and infrastructure from the ravages of electronic terrorism and associated cyber crimes. Once only a topic for made-for-television thrillers, cyber terrorism has captured global front page headlines and reported top news stories from every facet of commerce. Individuals engaged in international, industrial espionage, organized crime, competitive intelligence gathering, political warfare, and destruction of critical infrastructure pose a threat to governments, organizations and citizens alike.

This seminar is designed to provide the attendee with a fresh examination of the inherent risks associated with individuals or groups, who use cyberspace to threaten international governments, interfere with domestic operations, terrorize the citizens of a country, and attempt to disrupt corporate operations and how to minimize exposure to these risks.

Course Objectives: 

After completing this seminar, participants will:
• Recognize and identify the differences between cyber crimes, cyber warfare, cyber terrorism and cyber threats.
• Have a working knowledge of the current risks, threats and exposures facing 21st century organizations doing business in virtual global marketplaces.
• Understand the basic principles and philosophies of cyber terrorism and how individuals and corporations can be targeted.
• Identify existing exposures and weaknesses within their organization's operations, which would make the organization an easy target for cyber terrorists.
• Be prepared to assist their organization in securing its operations, minimizing its security exposure, and mitigating the possibility of becoming the victim of a cyber-based attack.

Course Length: 
2.0 Days
Upcoming Events: 

This session is offered at the following upcoming Training Events:

Not yet scheduled

Intended Audience: 

This seminar is intended for Chief Security Officers, Chief Technology Officers, Chief Information Officers, Controllers and their management, internal and external audit professionals, InfoSec and law enforcement professionals, system analysts, decision makers who need a thorough understanding of the cyber threats facing 21st century organizations, and individuals who wish to learn more about controlling and hardening their organization's environment against cyber-attacks.

Learning Level: 
Suitable for those new to the topic
Instructional Method: 

Group-live

Prerequisites: 

There is no prerequisite for this seminar.

CPE Credits: 
14 Hours
Detailed Course Description: 

Investigating Cyber Threats
• What does history tell us?
• What’s at risk?
• Who is at risk?
• What are the key weaknesses?
• Identifying key threats
• Analysis of the surveys, what do the numbers say?
• What does the future look like?

What is Cyber Crime?
• ID Fraud
• Medical Fraud
• Counterfeiting
• Bots

Defining Cyber-Terrorism
• Critical National Infrastructures
 Banking
 Transportation
 Energy
 Vital Human Services
• Examples of Cyber Crimes
• Information as a Resource?

Exercise #1 Where the Wild Things Are

The Reality of Cyber-Terrorism
• Shifting Priorities and Public Services The Affect of Terrorism
• Risk of Major Cyber Attacks
• Factors Point Toward Significant Super Terrorism in 21st Century

Portrait of a Cyber Terrorist

Business Risk
• Risk Management Model
• Cyber Threats

Common Security Problems Plaguing the Internet
• Some All-to-Common Internet Attack Methods

Terrorist’s Tools and Techniques
• The Cyber-Terrorist's Traditional Weapons of Choice

Mitigating the Terrorist Threat
• Incident Handling Life Cycle
• Key Controls to Mitigating Cyber Terror Attacks
• Safeguarding Computer Networks
• Cyber Security Recommendations
• Suggested Smart Practices

Exercise #2 Cyber Extortion Case

International Cyber Terrorism: a Global Concern

Infrastructure Attacks
• Infrastructure Evolution
• Potential Targets of Cyber-Terrorism
• Common Security Threats

Internet Attacks
• Attack Sophistication vs. Intruder Technical Knowledge
• Vulnerability Exploit Cycle
• How Could You Take Down Most of the Internet?

Examining Cyber Warfare
• Definition
 Stuxnet
 Duqu
 Wiper
 Flame
• What’s Next????

Using a Network Analyzer as a Security Tool

Retrospective Network Analysis

Cyber Forensics
• Uncovering Digital Evidence
• Network Security Forensics

IT Tools -- Achieving Greater Security through Technology Solutions
• Monitoring Network Activity - Network Instruments – Observer
• Vulnerability Management - PatchLink Security Management Console 6.4
• Regulatory Compliance – Liquid Machines
• E-mail Threats – Arcmail Solutions
• Securing Corporate Communications - Ironport

Exercise #3 Developing a Cyber Attack Response Plan

Summary